Page 1 Next

Displaying 1 – 20 of 1464

Showing per page

( h , Φ ) -entropy differential metric

María Luisa Menéndez, Domingo Morales, Leandro Pardo, Miquel Salicrú (1997)

Applications of Mathematics

Burbea and Rao (1982a, 1982b) gave some general methods for constructing quadratic differential metrics on probability spaces. Using these methods, they obtained the Fisher information metric as a particular case. In this paper we apply the method based on entropy measures to obtain a Riemannian metric based on ( h , Φ ) -entropy measures (Salicrú et al., 1993). The geodesic distances based on that information metric have been computed for a number of parametric families of distributions. The use of geodesic...

( R , S ) -information radius of type t and comparison of experiments

Inder Jeet Taneja, Luis Pardo, D. Morales (1991)

Applications of Mathematics

Various information, divergence and distance measures have been used by researchers to compare experiments using classical approaches such as those of Blackwell, Bayesian ets. Blackwell's [1] idea of comparing two statistical experiments is based on the existence of stochastic transformations. Using this idea of Blackwell, as well as the classical bayesian approach, we have compared statistical experiments by considering unified scalar parametric generalizations of Jensen difference divergence measure....

2 -modular lattices from ternary codes

Robin Chapman, Steven T. Dougherty, Philippe Gaborit, Patrick Solé (2002)

Journal de théorie des nombres de Bordeaux

The alphabet 𝐅 3 + v 𝐅 3 where v 2 = 1 is viewed here as a quotient of the ring of integers of 𝐐 ( - 2 ) by the ideal (3). Self-dual 𝐅 3 + v 𝐅 3 codes for the hermitian scalar product give 2 -modular lattices by construction A K . There is a Gray map which maps self-dual codes for the Euclidean scalar product into Type III codes with a fixed point free involution in their automorphism group. Gleason type theorems for the symmetrized weight enumerators of Euclidean self-dual codes and the length weight enumerator of hermitian self-dual...

4D Embryogenesis image analysis using PDE methods of image processing

Paul Bourgine, Róbert Čunderlík, Olga Drblíková-Stašová, Karol Mikula, Mariana Remešíková, Nadine Peyriéras, Barbara Rizzi, Alessandro Sarti (2010)


In this paper, we introduce a set of methods for processing and analyzing long time series of 3D images representing embryo evolution. The images are obtained by in vivo scanning using a confocal microscope where one of the channels represents the cell nuclei and the other one the cell membranes. Our image processing chain consists of three steps: image filtering, object counting (center detection) and segmentation. The corresponding methods are based on numerical solution of nonlinear PDEs, namely...

A chaos-based secure cluster protocol for wireless sensor networks

Qian Fang, Ying Liu, Xiaoqun Zhao (2008)


Security mechanisms for wireless sensor networks (WSN) face a great challenge due to the restriction of their small sizes and limited energy. Hence, many protocols for WSN are not designed with the consideration of security. Chaotic cryptosystems have the advantages of high security and little cost of time and space, so this paper proposes a secure cluster routing protocol based on chaotic encryption as well as a conventional symmetric encryption scheme. First, a principal-subordinate chaotic function...

A collector for information without probability in a fuzzy setting

Doretta Vivona, Maria Divari (2005)


In the fuzzy setting, we define a collector of fuzzy information without probability, which allows us to consider the reliability of the observers. This problem is transformed in a system of functional equations. We give the general solution of that system for collectors which are compatible with composition law of the kind “inf”.

Currently displaying 1 – 20 of 1464

Page 1 Next